b2g technology report mobile application security

12
Daeho Ryu at Born2Global [email protected] B2G Technology Report Mobile Application Security

Upload: dillan-ryu

Post on 13-Jan-2015

161 views

Category:

Technology


4 download

DESCRIPTION

Mobile Application Security

TRANSCRIPT

Page 1: B2G Technology Report Mobile Application Security

Daeho Ryu at Born2Global

[email protected]

B2G Technology Report Mobile Application Security

Page 2: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

1

Contents

2 Summary

3 Technologies

5 Market Outlook

6 Fundraising

8 Start-ups Insight

10 VCโ€™s View

๋ณธ ๋ณด๊ณ ์„œ๋Š” ๊ตญ๋‚ด ์Šคํƒ€ํŠธ์—…์˜ ์„ฑ๊ณต์ ์ธ ํ•ด์™ธ์ง„์ถœ ๊ธฐํšŒ๋ฅผ

๋ชจ์ƒ‰ํ•˜๊ธฐ ์œ„ํ•ด ์ž‘์„ฑ๋˜์—ˆ๋‹ค. ํ•ด์™ธ ํˆฌ์ž์ž๋“ค์ด ์ฃผ๋ชฉํ•˜๊ณ  ์žˆ๋Š”

๊ธฐ์ˆ ๊ณผ ํˆฌ์žํ˜„ํ™ฉ์„ ์‚ดํŽด๋ณด๊ณ , ๊ตญ๋‚ด ์Šคํƒ€ํŠธ์—… ๋ฐ ํˆฌ์ž์ž์™€์˜

์ธํ„ฐ๋ทฐ๋ฅผ ํ†ตํ•ด ํ–ฅํ›„ ๋‚˜์•„๊ฐˆ ๋ฐฉํ–ฅ์„ ์ œ์‹œํ•˜๊ณ ์ž ํ•œ๋‹ค.

Page 3: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

2

Summary

IT ๋ณด์•ˆ์˜ ์ค‘์‹ฌ์ด ๋„คํŠธ์›Œํฌ์™€ ์„œ๋ฒ„ ๋“ฑ IT ์ธํ”„๋ผ๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๋ณด์•ˆ์œผ๋กœ๋ถ€ํ„ฐ

๋ฐ์ดํ„ฐ์™€ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋ณดํ˜ธํ•˜๋Š” ๋ณด์•ˆ์œผ๋กœ ์ด๋™ํ•˜๊ณ  ์žˆ๋‹ค. ๋˜ํ•œ ๋ฐ์ดํ„ฐ์™€

์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์— ๋Œ€ํ•œ ๊ณต๊ฒฉ์ด ์›น์—์„œ ๋ชจ๋ฐ”์ผ ๋ฐ ํด๋ผ์šฐ๋“œ๋กœ ์ด๋™ํ•˜๊ณ  ์žˆ๋‹ค.

๊ธฐ์กด์˜ ์›น๋ณด์•ˆ ์‹œ์žฅ์€ ๋Œ€๊ธฐ์—…์„ ์ค‘์‹ฌ์œผ๋กœ ๋ฐœ์ „ํ•ด ์™”๋‹ค. ์ด์ œ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์‹œ์žฅ์ด

์—ด๋ฆฌ๋ฉด์„œ ์›น๋ณด์•ˆ ์†”๋ฃจ์…˜๋“ค๋„ ๋ชจ๋ฐ”์ผ ํ™˜๊ฒฝ์— ์ ์šฉํ•ด์•ผ ํ•˜๋Š” ์ƒํ™ฉ์ด ๋˜์—ˆ๋‹ค. ๋˜ํ•œ

๊ธฐ์กด ๋ณด์•ˆ ์†”๋ฃจ์…˜ ์‚ฌ์—…์ž๋“ค์ด ์•„์ง ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์‚ฌ์—…์— ๋Œ€ํ•œ ํ™•์‹ ์„ ๊ฐ–์ง€ ๋ชปํ•˜๋Š”

์‚ฌ์ด, ์Šคํƒ€ํŠธ์—…๋“ค์ด ๋น ๋ฅด๊ฒŒ ์‹œ์žฅ์— ์ง„์ถœํ•ด ์„ธ๋ ฅ์„ ํ™•๋ณดํ•˜๊ณ  ์žˆ๋‹ค. ๊ธฐ์ˆ ๋ ฅ์„ ๊ฐ€์ง„

์Šคํƒ€ํŠธ์—…๋“ค์—๊ฒŒ ๊ธฐํšŒ์˜ ๋ฌธ์ด ์—ด๋ฆฌ๊ณ  ์žˆ๋Š” ๊ฒƒ์ด๋‹ค.

์ „ํ†ต์ ์ธ ๊ตญ๋‚ด ๋ณด์•ˆ์‹œ์žฅ์€ SI ์‚ฌ์—…์„ ํ†ตํ•œ ์‹œ์žฅ ๋ ˆํผ๋Ÿฐ์Šค๊ฐ€ ๋งค์šฐ ์ค‘์š”ํ•˜๊ณ 

์ •๋ถ€์˜ˆ์‚ฐ์ด๋‚˜ ๋ฐฉ์นจ์— ๋”ฐ๋ฅธ ์‹œ์žฅ์˜ ๋ณ€๋™์„ฑ์ด ์‹ฌํ•˜๊ธฐ ๋•Œ๋ฌธ์— ์Šคํƒ€ํŠธ์—…๋“ค์—๊ฒŒ๋Š”

์—ฌ์ „ํžˆ ์ง„์ž…์žฅ๋ฒฝ์ด ๋†’๋‹ค. ์Šคํƒ€ํŠธ์—…๋“ค์ด ํ•ด์™ธ ์ง„์ถœ์„ ์ ๊ทน ๊ณ ๋ คํ•ด์•ผ ํ•˜๋Š” ๋Œ€๋ชฉ์ด๋‹ค.

๋””์ง€ํ„ธํ™”๋กœ ์ธํ•œ B2C ๋ฐ์ดํ„ฐ์˜ ์–‘์ด ์ฆ๊ฐ€ํ•˜๋ฉด์„œ ๊ธฐ์กด ์—…์ฒด์™€ ๊ธฐ์ˆ ์„ ๋ฐ”ํƒ•์œผ๋กœ ํ•œ

์Šคํƒ€ํŠธ์—…๋“ค์—๊ฒŒ ์ƒˆ๋กœ์šด ์‹œ์žฅ์ด ์—ด๋ฆฌ๊ณ  ์žˆ๋‹ค. ํ•ด์™ธ ํˆฌ์ž์ž๋“ค์ด ํŠนํ™”๋œ ๊ธฐ์ˆ ์„

๋ณด์œ ํ•œ ์Šคํƒ€ํŠธ์—…๋“ค์— ์ฃผ๋ชฉํ•˜๊ณ  ์žˆ๋Š” ์ด์œ ์ด๋‹ค.

๋ชจ๋ฐ”์ผ ์ƒํƒœ๊ณ„๊ฐ€ ์„ฑ์žฅํ•˜๋ฉด์„œ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์ง€์›ํ•˜๋Š” ์š”์†Œ๊ธฐ์ˆ  ๋ฐ ์„œ๋น„์Šค์— ๋Œ€ํ•œ

์ˆ˜์š”๊ฐ€ ์ปค์ง€๊ณ  ์žˆ๋‹ค. ์Šคํƒ€ํŠธ์—…๋“ค์ด ์•”ํ˜ธํ™”, ๋‚œ๋…ํ™” ๋“ฑ์˜ ๋ณด์•ˆ๊ธฐ์ˆ ์— ์ฃผ๋ชฉํ•ด์•ผ ํ•˜๋Š”

์ด์œ ์ด๋‹ค. In-App Purchase ์‹œ์žฅ์˜ ํŒฝ์ฐฝ์€ ๋ชจ๋ฐ”์ผ Fraud Detection System ๋„์ž…์„

์•ž๋‹น๊ธธ ๊ฒƒ์ด๋‹ค. ๊ฒฐ๊ตญ Protection ๊ธฐ์ˆ ๊ณผ Detection ๊ธฐ์ˆ ์ด ์ƒํ˜ธ๋ณด์™„์ž‘์šฉ์„ ํ•  ๋•Œ

๋ณด์•ˆ ์‹œ์Šคํ…œ์˜ ์™„์„ฑ๋„๋Š” ๋”์šฑ ๋†’์•„์งˆ ๊ฒƒ์ด๋‹ค.

Page 4: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

3

Technologies

Application Shielding

์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ํƒ€๊ฒŸ์œผ๋กœ ํ•˜๋Š” ๊ณต๊ฒฉ์„ ํƒ์ง€ํ•˜๊ณ  ์˜ˆ๋ฐฉํ•˜๋Š” ๊ธฐ์ˆ ์ด๋ฉฐ, ๊ฐœ๋ฐœ์ž๊ฐ€

์†Œ์Šค์ฝ”๋“œ๋ฅผ ๋ณ€๊ฒฝํ•˜์ง€ ์•Š๊ณ  ๋ณด์•ˆ ๊ธฐ๋Šฅ์„ ํƒ‘์žฌํ•˜๋Š” ๊ฒƒ์ด ๊ฐ€์žฅ ์ด์ƒ์ ์ธ ๋ฐฉ์‹์ด๋‹ค.

๋ชจ๋ฐ”์ผ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๊ธ‰์ฆ์œผ๋กœ 2013๋…„๋ถ€ํ„ฐ ์ฃผ๋ชฉ์„ ๋ฐ›๊ณ  ์žˆ์œผ๋ฉฐ ์•”ํ˜ธํ™”์™€ ์ธ์ฆ

๊ธฐ๋Šฅ์˜ ํƒ‘์žฌ๋กœ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์ •๋ณด๋ฅผ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ฒŒ์ž„ ์‹œ์Šคํ…œ์„ ๋…ธ๋ฆฌ๋Š”

ํ•ด์ปค๋“ค์ด ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋Š” ์ƒํ™ฉ์—์„œ ์ฃผ๋ชฉํ•ด์•ผ ํ•  ๊ธฐ์ˆ ์ด๋‹ค.

Application Obfuscation

๋‚œ๋…ํ™” (Obfuscation)๋Š” ์†Œํ”„ํŠธ์›จ์–ด์˜ ์†Œ์Šค์ฝ”๋“œ ๋˜๋Š” ๋จธ์‹ ์ฝ”๋“œ (๋ฐ”์ด๋„ˆ๋ฆฌ)๋ฅผ ์‚ฌ๋žŒ

๋˜๋Š” ๋ถ„์„ ๋„๊ตฌ๊ฐ€ ์ดํ•ดํ•˜๊ฑฐ๋‚˜ ๋ถ„์„ํ•˜๊ธฐ ํž˜๋“ค๊ฒŒ ๋งŒ๋“œ๋Š” ๊ธฐ์ˆ ์ด๋‹ค. ์†Œ์Šค์ฝ”๋“œ

๋‚œ๋…ํ™”๋Š” ์ผ๋ถ€ ์†Œ์Šค๋ฅผ ๋ถ€๋ถ„์ ์œผ๋กœ ๋‚œ๋…ํ™”ํ•˜์—ฌ ์ „์ฒด ํ”Œ๋กœ์šฐ๋ฅผ ์•Œ์•„๋ณด๊ธฐ ํž˜๋“ค๋„๋ก

์†Œ์Šค์ฝ”๋“œ๋ฅผ ๊ผฌ๋Š” ๊ฒƒ์„ ๋œปํ•œ๋‹ค. ๋ฐ˜๋ฉด ๋ฐ”์ด๋„ˆ๋ฆฌ ๋‚œ๋…ํ™”๋Š” ์ปดํŒŒ์ผ ํ›„์— ์ƒ์…ฉ๋œ

๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ์—ญ๊ณตํ•™ (Reverse engineering)์„ ํ†ตํ•ด ๋ถ„์„ํ•˜๊ธฐ ํž˜๋“ค๊ฒŒ ๋ณ€์กฐํ•˜๋Š”

๊ธฐ์ˆ ์ด๋‹ค. ๊ฐœ๋ฐœ์ž๊ฐ€ ์†Œ์Šค์ฝ”๋“œ๋ฅผ ์ˆ˜์ •ํ•˜์ง€ ์•Š๊ณ  ๊ฐ„ํŽธํ•˜๊ฒŒ ์ ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค.

Mobile Fraud Detection

Fraud Detection System (FDS, ์‚ฌ๊ธฐ๋ฐฉ์ง€์‹œ์Šคํ…œ)์€ ์„œ๋น„์Šค ์‚ฌ์šฉ์ž์˜ ์—ฌ๋Ÿฌ ๊ฐ€์ง€

ํŒจํ„ด์„ ์œ ํ˜•ํ™”ํ•˜์—ฌ ๋ถ€์ •์‚ฌ์šฉ ํŒจํ„ด๊ณผ์˜ ์ƒ๊ด€ ๊ด€๊ณ„๋ฅผ ๊ณ„๋Ÿ‰ํ™” ํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•ด ์ค€๋‹ค.

Mobile Fraud Detection ๊ธฐ์ˆ ์€ ์˜ˆ์ธก ๋ชจ๋ธ๋ง ๋ฐ ๊ณ ๊ธ‰ ๋ถ„์„๋ฐฉ๋ฒ•์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด

์‹ค์‹œ๊ฐ„ ๋ฐ์ดํ„ฐ ๋ถ„์„์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜์—ฌ, ์˜์‹ฌ์Šค๋Ÿฌ์šด ์‚ฌ์šฉ์ž์˜ ๋ชจ๋ฐ”์ผ ๋””๋ฐ”์ด์Šค

ํ™œ๋™์„ ๊ฐ์‹œํ•œ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ํšจ์œจ์ ์ธ ๊ธฐ๋Šฅ์„ ์œ„ํ•ด ๊ธฐ์กด์˜ FDS์™€ ์—ฐ๊ณ„ํ•ด์•ผ ํ•  ํ•„์š”๊ฐ€

์žˆ๋‹ค. ํ–ฅํ›„์—๋Š” Big Data Analytics ๊ธฐ๋ฐ˜์˜ FDS๊ฐ€ ๋ณด์•ˆ ์‹œ์žฅ์„ ๊ฒฌ์ธํ•ด ๋‚˜๊ฐˆ

๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

Page 5: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

4

Technologies - Hype Cycle

Application Obfuscation ๊ธฐ์ˆ ์€ ์ดˆ๊ธฐ๋ณด๋‹ค ๊ฐœ์„ ๋œ 2, 3์„ธ๋Œ€ ์†”๋ฃจ์…˜์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ

์œผ๋‚˜, ๋ณด์ˆ˜์ ์ธ ๊ธฐ์—…๋“ค์€ ์—ฌ์ „ํžˆ ๊ด€๋ง ์ค‘์ด๋‹ค. Application Shielding ๊ธฐ์ˆ ์€ ์ดˆ๊ธฐ

์ˆ˜์ค€์— ๋จธ๋ฌผ๋ฉด์„œ ๋งŽ์€ ๊ธฐ์—…๋“ค์˜ ๊ด€์‹ฌ์„ ๋Œ๊ณ  ์žˆ๋Š” ์ƒํ™ฉ์ด๋‹ค. Mobile Fraud

Detection ๊ธฐ์ˆ ์€ ๊ธฐ์ˆ ์˜ ์ž ์žฌ์„ฑ์œผ๋กœ ์ธํ•ด ๋ฏธ๋””์–ด์—์„œ ์ข…์ข… ์–ธ๊ธ‰๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌ

ํ•œ ์ƒํ™ฉ์€ ๊ณผ๊ฐํ•˜๊ณ  ์„ ์ œ์ ์œผ๋กœ ๋Œ€์‘ํ•˜๋Š” ์Šคํƒ€ํŠธ์—…๋“ค์—๊ฒŒ ๊ธฐํšŒ๋ฅผ ์ œ๊ณตํ•  ๊ฒƒ์ด๋‹ค.

Page 6: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

5

Market Outlook

[์ถœ์ฒ˜ : IDC]

์ „์„ธ๊ณ„ ์ •๋ณด๋ณด์•ˆ ์‹œ์žฅ๊ณผ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์‹œ์žฅ์€ 2012~2016๋…„ ๊ฐ๊ฐ ์—ฐํ‰๊ท  8%์™€

28% ์„ฑ์žฅ์ด ์˜ˆ์ƒ๋œ๋‹ค. IDC๋Š” 2013๋…„ ์ „์„ธ๊ณ„ ์Šค๋งˆํŠธํฐ ๋ฐ ํƒœ๋ธ”๋ฆฟPC ์ถœํ•˜๋Ÿ‰์ด 12์–ต

๋Œ€์—์„œ 2017๋…„ 21์–ต๋Œ€ ์ˆ˜์ค€์œผ๋กœ ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ–ˆ์œผ๋ฉฐ, ์‹œ์Šค์ฝ”๋Š” ์ง€์‹๊ทผ๋กœ์ž

1์ธ๋‹น BYOD (Bring your own device) ํ‰๊ท  ๋Œ€์ˆ˜๋Š” 2012๋…„ 1.3๋Œ€์—์„œ 2014๋…„

1.8๋Œ€๋กœ ๋Š˜์–ด๋‚  ๊ฒƒ์œผ๋กœ ์ „๋งํ–ˆ๋‹ค.

61.867.2

71.7

78.1

86

0

10

20

30

40

50

60

70

80

90

100

2012 2013 2014 2015 2016

2012๋…„~2016๋…„ ์ „ ์„ธ๊ณ„ ์ •๋ณด ๋ณด์•ˆ ์‹œ์žฅ ์„ฑ์žฅ ์ „๋ง ์ถ”์ด (๋‹จ์œ„ : ์กฐ์›)

0.94

1.23

1.57

1.92

2.27

0

0.5

1

1.5

2

2.5

2012 2013 2014 2015 2016

2012๋…„~2016๋…„ ์ „ ์„ธ๊ณ„ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์‹œ์žฅ ์„ฑ์žฅ ์ „๋ง ์ถ”์ด (๋‹จ์œ„ : ์กฐ์›)

Page 7: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

6

Fundraising

ํˆฌ์ž ํฌ์ธํŠธ

ํ•ดํ‚น์— ์˜ํ•œ ๊ฒŒ์ž„์‹œ์žฅ์˜ ํ”ผํ•ด๋งŒ ์—ฐ๊ฐ„ $10 billion ์ด์ƒ์œผ๋กœ ์ถ”์ •๋จ

๊ธฐ์—… ๋ฐ ์ž„๋ฒ ๋””๋“œ ์†Œํ”„ํŠธ์›จ์–ด ์‹œ์žฅ์˜ ๊ฒฌ๊ณ ํ•œ ์„ฑ์žฅ์„ธ๊ฐ€ ์˜ˆ์ƒ๋จ

์œ ๋‹ˆํฌํ•œ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์†”๋ฃจ์…˜ ๊ธฐ์ˆ ์ด ํ•„์š”ํ•จ

๊ธฐ์ˆ ๋ ฅ๊ณผ ์‹œ์žฅ ๋ ˆํผ๋Ÿฐ์Šค๋ฅผ ๋ณด์œ ํ•œ ์šฐ์ˆ˜ํ•œ ํŒ€ ๊ตฌ์„ฑ

Stuart Paterson, a partner at SEP (Scottish Equity Partners) "Metaforicโ€™s products serve an urgent need for games companies and enterprise software businesses to deploy software solutions which prevent loss of revenue through piracy, or need the reassurance that their software has been hardened against cyber attack." Craig Anderson, a partner at Pentech Ventures "Metaforic has made considerable progress since our initial investment in 2008, and is experiencing growing demand for its range of security and asset protection products, based on its unique anti-tamper technology.โ€

11.2

10.1

3.8

13

2

8

13

44

6.1

15

1

0.2

8

0.50

2

4

6

8

10

12

14

16

2005 2006 2007 2008 2009 2010 2011 2012 2013

$ M

illio

n

41st Parameter

Metaforic

Arxan

Trusteer

iovation

Nukona

V.i. Laboratories

Page 8: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

7

Fundraising

41st Parameter (Mobile Fraud Detection)

04๋…„ ์„ค๋ฆฝ, Funding $38.1M

13๋…„ Experian์— ์˜ํ•ด $324M์— ์ธ์ˆ˜๋จ

ํˆฌ์ž์ž : Georgian Partners, Jafco Ventures, Norwest Venture Partners,

Kleiner Perkins Caufield & Byers

Metaforic (Application Shielding, Mobile Fraud Detection)

06๋…„ ์„ค๋ฆฝ, Funding $10M

14๋…„ Inside Secure์— ์˜ํ•ด $11.6M์— ์ธ์ˆ˜๋จ

ํˆฌ์ž์ž : Scottish Equity Partners, Scottish Venture Fund, Pentech Ventures,

Scottish Investment Bank

Arxan (Application Obfuscation, Application Shielding, Mobile Fraud Detection)

01๋…„ ์„ค๋ฆฝ, Funding $38.1M

ํˆฌ์ž์ž : EDF Ventures, Legend Ventures, Solstice Capital, Paladin Capital

Group, Trident Capital, TA Associates

Trusteer (Mobile Fraud Detection)

05๋…„ ์„ค๋ฆฝ, Funding $10.1M

13๋…„ IBM์— ์˜ํ•ด $800M์— ์ธ์ˆ˜๋จ

ํˆฌ์ž์ž : US Venture Partners, Rakesh Loonkar, Shlomo Kramer

iovation (Mobile Fraud Detection)

04๋…„ ์„ค๋ฆฝ, Funding $16M

ํˆฌ์ž์ž : Intel Capital, SAP Ventures, European Founders Fund

Nukona (Application Shielding)

10๋…„ ์„ค๋ฆฝ, Funding $0.2M

12๋…„ Symantec์— ์˜ํ•ด ์ธ์ˆ˜๋จ

ํˆฌ์ž์ž : Citrix Startup Accelerator

V.i. Laboratories (Application Obfuscation, Application Shielding)

02๋…„ ์„ค๋ฆฝ, Funding $8.5M

ํˆฌ์ž์ž : Rockford Capital, Ascent Venture Partners, Core Capital Partners

Page 9: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

8

Start-ups Insight - INKA ENTWORKS

[INKA ENTWORKS ์•ˆ์„ฑ๋ฏผ ๋Œ€ํ‘œ(์ขŒ) ์ธํ„ฐ๋ทฐ]

INKA ENTWORKS๋Š” ๋””์ง€ํ„ธ

์ปจํ…์ธ ์˜ ํ•ฉ๋ฒ•์ ์ด๋ฉด์„œ ์•ˆ์ „ํ•œ

์œ ํ†ต์„ ์ง€์›ํ•˜๋Š” ์ €์ž‘๊ถŒ ๋ณดํ˜ธ

์†”๋ฃจ์…˜ (DRM)์„ 10๋…„๊ฐ„ ์—ฐ๊ตฌ ๋ฐ

์„œ๋น„์Šค ํ•œ ๋Œ€ํ•œ๋ฏผ๊ตญ ๋Œ€ํ‘œ ๊ธ€๋กœ๋ฒŒ

DRM๊ธฐ์—…์ด๋‹ค. ์ตœ๊ทผ Appsealing ์ œํ’ˆ

์ถœ์‹œ์™€ ํ•จ๊ป˜ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ์‹œ์žฅ ์ง„์ถœ์„

๊ฐ€์†ํ™” ํ•˜๊ณ  ์žˆ๋‹ค.

INKA ENTWORKS์˜ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์†”๋ฃจ์…˜ Appsealing์€ ์•”ํ˜ธํ™” (Encryption)

๋ฐฉ์‹์„ ์ฑ„ํƒํ•˜๊ณ  ์žˆ๋‹ค. ์•”ํ˜ธํ™”์˜ ์žฅ์ ์€ ํ•ดํ‚น์„ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์„ ๋ฟ ์•„๋‹ˆ๋ผ, ์ค‘์š”

์ฝ”๋“œ๋ฅผ ์•”ํ˜ธํ™”ํ•ด์„œ ์ˆจ๊ฒจ๋†“์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ํŠนํžˆ ์ œํ’ˆ ๊ธฐํš ๋‹จ๊ณ„๋ถ€ํ„ฐ ๋ชจ๋ฐ”์ผ

๊ฒŒ์ž„ ์‹œ์žฅ์— ํŠนํ™”๋œ ๊ธฐ์ˆ ์„ ๊ฐœ๋ฐœํ•˜์˜€๊ธฐ์— ๋ชจ๋ฐ”์ผ ๊ฒŒ์ž„ ๋ณด์•ˆ์˜ ์—ฌ๋Ÿฌ ์š”์†Œ๋ฅผ

์ง€์›ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋ฏธ ํ•ด์™ธ์—์„œ ๊ธฐ์ˆ ๋ ฅ์„ ์ธ์ •๋ฐ›๊ณ  ์žˆ์œผ๋ฉฐ ๋””์ฆˆ๋‹ˆ์‚ฌ์—์„œ ๊ฐœ๋ฐœํ•œ

์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์— ์ ์šฉ๋  ์˜ˆ์ •์ด๋‹ค.

INKA ENTWORKS์˜ ๋น„์ฆˆ๋‹ˆ์Šค ๋ชจ๋ธ์€ ์†”๋ฃจ์…˜ ์ ์šฉ ์‹œ์— ์š”๊ธˆ์„ ๋ถ€๊ณผํ•˜๋Š”

๋ฐฉ์‹์ด๋‹ค. ๊ฒฝ์Ÿ์‚ฌ๋“ค์— ๋น„ํ•˜์—ฌ ํ›จ์”ฌ ์ €๋ ดํ•œ ๊ฐ€๊ฒฉ์— ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•จ์œผ๋กœ์จ ์˜์„ธํ•œ

๋ชจ๋ฐ”์ผ ๊ฒŒ์ž„๊ฐœ๋ฐœ์‚ฌ๋“ค๋„ ๋ถ€๋‹ด ์—†์ด ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค.

INKA ENTWORKS๋Š” ๋ชจ๋ฐ”์ผ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋ณดํ˜ธ ์˜์—ญ์„ ๋„˜์–ด ํƒ์ง€์˜์—ญ์— ๋Œ€ํ•œ

๊ธฐ์ˆ ๊ฐœ๋ฐœ์„ ์ถ”์ง„ํ•˜๊ณ  ์žˆ๋‹ค. ํ–ฅํ›„ ๋ชจ๋ฐ”์ผ In-App Purchase ์‹œ์žฅ์˜ ์„ฑ์žฅ์— ๋Œ€ํ•œ

ํ™•์‹ ์„ ํ† ๋Œ€๋กœ ๋ชจ๋ฐ”์ผ Fraud Detection ๊ธฐ์ˆ  ๊ฐœ๋ฐœ์„ ํ†ตํ•ด ์‹œ์žฅ ์„ ๋„

๊ธฐ์—…์œผ๋กœ์จ์˜ ์ž…์ง€๋ฅผ ๋‹ค์งˆ ๊ณ„ํš์ด๋‹ค.

Page 10: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

9

Start-ups Insight - SEWORKS

[SEWORKS ๋ฐ•๊ด‘ํ˜ ์˜์—…ํŒ€์žฅ(์šฐ) ์ธํ„ฐ๋ทฐ]

SEWORKS๋Š” ๊ธ€๋กœ๋ฒŒ ํ•ดํ‚น ๋ฐฉ์–ด๋Œ€ํšŒ

์ถœ์‹ ์˜ ํ•ด์ปค๋“ค๋กœ ๊ตฌ์„ฑ๋œ ์ „๋ฌธ๊ฐ€

์ง‘๋‹จ์ด๋‹ค. ํŠนํžˆ ํ™๋ฏผํ‘œ ๋Œ€ํ‘œ๋Š” ์„ ์ง„

ํ•ดํ‚น ๊ธฐ๋ฒ•๊ณผ ๋ณด์•ˆ ๊ธฐ์ˆ ์„ ์—ฐ๊ตฌํ•˜๋Š”

์™€์šฐํ•ด์ปค์˜ ์„ค๋ฆฝ ๋ฐ ๋ณด์•ˆํšŒ์‚ฌ

์‰ฌํ”„ํŠธ์›์Šค (Shiftworks)๋ฅผ Exitํ•œ

๊ฒฝํ—˜์ด ์žˆ๋‹ค.

SEWORKS์˜ ์ฃผ๋ ฅ ์ œํ’ˆ ๋ฉ”๋‘์‚ฌ๋Š” ์†Œ์Šค์ฝ”๋“œ๋ฅผ ๋…ธ๋ฆฌ๋Š” ํ•ด์ปค๋“ค์„ ๋ฐฉ์–ดํ•˜๊ธฐ ์œ„ํ•œ

๋‚œ๋…ํ™” (Obfuscation) ๊ธฐ์ˆ ์„ ์ œ๊ณตํ•œ๋‹ค. ๊ฐœ๋ฐœ ๋‹จ๊ณ„์—์„œ API (Application

programming interface)๋ฅผ ์ œ๊ณตํ•˜๋Š” ๊ธฐ์กด ์—…์ฒด์™€๋Š” ๋‹ฌ๋ฆฌ, ๊ฐœ๋ฐœ์ด ์™„๋ฃŒ๋œ ํ›„์—

ํด๋ผ์šฐ๋“œ์—์„œ ์ œ๊ณต๋˜๋Š” ์—”์ง„์„ ์›น์ƒ์—์„œ ํ™œ์šฉ ๊ฐ€๋Šฅํ•œ Saas (Soft as a service)

ํ˜•ํƒœ๋กœ ์ œ๊ณตํ•œ๋‹ค. ๊ธฐ์กด์˜ ๊ธฐ์ˆ ์€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด๋‚˜ ์†Œ์Šค์ฝ”๋“œ๋ฅผ ๋ถ€๋ถ„์ ์œผ๋กœ

๋‚œ๋…ํ™”ํ•˜๋Š”๋ฐ ๊ทธ์ณค์œผ๋‚˜, SEWORKS์˜ ๋ฐ”์ด๋„ˆ๋ฆฌ ๊ธฐ์ˆ ์€ ๋ฐ”์ดํŠธ ๋‹จ์œ„์˜ ํ•˜์œ„

์ •๋ณด๋“ค์„ ๋ณ€ํ™˜์‹œ์ผœ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ์ „์ฒด์˜ ๋ณ€ํ™”๋ฅผ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•œ๋‹ค.

SEWORKS์˜ ๋น„์ฆˆ๋‹ˆ์Šค ๋ชจ๋ธ์€ ๊ตญ๋‚ด์˜ ๊ฒฝ์šฐ๋Š” ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜ ๋‹น ์—ฐ๊ฐ„ ๋ผ์ด์„ ์Šค๋ฅผ

๋ถ€๊ณผํ•œ๋‹ค. ๊ธˆ์œต์‚ฌ์˜ ๊ฒฝ์šฐ๋Š” ์†”๋ฃจ์…˜ ๋‚ฉํ’ˆ๊ณผ ์œ ์ง€๋ณด์ˆ˜ ๊ธฐ๊ฐ„์„ ํฌํ•จํ•˜์—ฌ ๊ณ„์•ฝ์„

์ฒด๊ฒฐํ•˜๊ธฐ๋„ ํ•˜๋ฉฐ, ํ•ด์™ธ์—์„œ๋Š” ๋‚œ๋…ํ™” ๋ชจ๋“ˆ ๋‹จ์œ„๋กœ ๊ฑฐ๋ž˜๊ฐ€ ๋˜๊ธฐ๋„ ํ•œ๋‹ค.

SEWORKS๋Š” ์‚ฌ์šฉ์ž ํ˜•ํƒœ์— ๋”ฐ๋ผ ๋‹ค์–‘ํ•œ ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ ์‹œ์žฅ์ด ํ˜•์„ฑ๋  ๊ฒƒ์œผ๋กœ

์ „๋งํ•˜๊ณ  ์žˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ๊ธ‰์ฆํ•˜๋Š” ๋ชจ๋ฐ”์ผ ์•…์„ฑ์ฝ”๋“œ, ์Šค๋ฏธ์‹ฑ ํ”ผํ•ด๋ฅผ ์˜ˆ๋ฐฉํ•˜๊ธฐ

์œ„ํ•ด์„œ๋Š” ๊ธˆ์œต ๋ณด์•ˆ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์ด์šฉํ•˜๋Š” ๊ฒƒ์ด ์ข‹์œผ๋ฉฐ, ์ด๋•Œ SEWORKS์˜

Appzerver๋ฅผ ํ™œ์šฉํ•˜๋ฉด ์œ„์กฐ ์–ดํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋‹ค์šด๋ฐ›์„ ์‹œ์— ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š”

๊ธˆ์ „์ ์ธ ํ”ผํ•ด๋ฅผ ์˜ˆ๋ฐฉํ•  ์ˆ˜ ์žˆ๋‹ค.

Page 11: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

10

VCโ€™s View

[ํฌ์Šค์ฝ” ๋ฒค์ฒ˜ํŒŒํŠธ๋„ˆ์Šค ์ด๊ทœ์› ๊ณผ์žฅ(์ขŒ), M๋ฒค์ฒ˜ํˆฌ์ž ์กฐ๋™๊ฑด ๋ถ€์žฅ(์šฐ) ์ธํ„ฐ๋ทฐ]

๊ตญ๋‚ด ๋ณด์•ˆ์‹œ์žฅ

ํ•œ๊ตญ์˜ ๋ณด์•ˆ์‹œ์žฅ์€ ๋ณด์ˆ˜์ ์ด๋ฉฐ, ๋Œ€๋‹ค์ˆ˜ ๊ธฐ์—…๋“ค์€ SI์˜ ๋งค์ถœ ๋น„์ค‘์ด ๋†’์€ ํŽธ์ด๋‹ค.

์ˆ˜์ต์„ฑ์€ ํŒจํ‚ค์ง€ ๋ฐ ASP (Application Service Provider) ์‚ฌ์—… ๋ชจ๋ธ์„ ํ†ตํ•ด์„œ

์‹คํ˜„ํ•˜๊ณ , ๋งค์ถœ ๊ทœ๋ชจ๋Š” SI์‚ฌ์—…์„ ํ†ตํ•ด ํ™•๋Œ€ํ•˜๊ณ  ์žˆ๋‹ค.

๊ตญ๋‚ด ๋ณด์•ˆ ์—…์ฒด์—๊ฒŒ ๋ ˆํผ๋Ÿฐ์Šค๋Š” ๊ต‰์žฅํžˆ ์ค‘์š”ํ•œ ์‚ฌ์•ˆ์ด๊ธฐ ๋•Œ๋ฌธ์— SI ์‚ฌ์—…์—

์ฐธ์—ฌํ•˜๋ฉด์„œ ์‹ ๊ทœ์‚ฌ์—…๊ธฐํšŒ๋ฅผ ๋ชจ์ƒ‰ํ•˜๋Š” ์ „๋žต์ด ์ค‘์š”ํ•˜๋‹ค. ํŠนํžˆ ์ตœ๊ทผ ์ •๋ถ€์—์„œ

์ค‘๊ฒฌ๊ธฐ์—…๊ณผ ๋Œ€๊ธฐ์—…์˜ SI ์‚ฌ์—…์— ์ œํ•œ์„ ๋‘๋ฉด์„œ ์ค‘์†Œ๊ทœ๋ชจ์˜ ๋ฒค์ฒ˜๊ธฐ์—…๊ณผ

์Šคํƒ€ํŠธ์—…๋“ค์—๊ฒŒ๋„ ๊ธฐํšŒ๊ฐ€ ์ƒ๊ธฐ๊ฒŒ ๋˜์—ˆ๋‹ค. ๊ทธ๋Ÿผ์—๋„ ๊ฒฝํ—˜ ์—†๋Š” ์‹ ๊ทœ ์‚ฌ์—…์ž์˜

์‹œ์žฅ ์ง„์ž…์€ ์—ฌ์ „ํžˆ ์–ด๋ ต๊ณ  CC (Common Criteria, ๊ตญ์ œ๊ณตํ†ต ํ‰๊ฐ€๊ธฐ์ค€) ์ธ์ฆ ๋“ฑ

์ œ๋ฐ˜ ๋น„์šฉ๋„ ๋งŽ์ด ๋ฐœ์ƒํ•˜๋Š” ์ ์„ ๊ฐ์•ˆํ•˜๋ฉด ์‹ ๊ทœ ์‹œ์žฅ ๊ฐœ์ฒ™์ด ํ•„์ˆ˜์ด๋‹ค.

Page 12: B2G Technology Report Mobile Application Security

Mobile Application Security

www.

11

VCโ€™s View

ํŠนํžˆ ๋ชจ๋ฐ”์ผ ๋””๋ฐ”์ด์Šค ๋ถ„์•ผ์˜ ์‹ ๊ทœ ์‹œ์žฅ์€ ์Šคํƒ€ํŠธ์—…๋“ค์—๊ฒŒ ๋‹ค์–‘ํ•œ ๊ฐ€๋Šฅ์„ฑ์„

์ œ์‹œํ•  ์ˆ˜ ์žˆ๋‹ค. ์˜ˆ๋ฅผ ๋“ค์–ด ๊ธˆ์œต ์„œ๋น„์Šค์˜ ์ง„ํ™”์— ๋”ฐ๋ฅธ Paperless, Branchless์˜

ํ™•๋Œ€ ๋ฐ ๋ชจ๋ฐ”์ผ์„ ์ด์šฉํ•œ ์—…๋ฌด, ๊ฒŒ์ž„, ๊ฒฐ์ œ, IoT ๋“ฑ ํ™œ์šฉ๋ถ„์•ผ์˜ ํ™•๋Œ€์— ๋”ฐ๋ฅธ ์‹ ๊ทœ

๋ณด์•ˆ ์ˆ˜์š” ๋ฐœ์ƒ ๋“ฑ์ด ์žˆ๋‹ค. ์—ฌ๊ธฐ์— ํŠนํ™”๋œ ๊ธฐ์ˆ ์„ ๋ฐ”ํƒ•์œผ๋กœ ํ•ด์™ธ์ง„์ถœ์ด๋‚˜ M&A

์ „๋žต์„ ์„ธ์šธ ํ•„์š”๊ฐ€ ์žˆ๋‹ค.

ํˆฌ์ž ์—…์ฒด

M๋ฒค์ฒ˜ํˆฌ์ž๋Š” ๋ ˆ๋“œ๋น„์”จใˆœ์— 20์–ต์„ ํˆฌ์žํ–ˆ๋‹ค. ๋ ˆ๋“œ๋น„์”จ๋Š” ์ „์ž๋ฌธ์„œ๋ณด์•ˆ,

๊ณต์ธ์ „์ž๋ฌธ์„œ์œ ํ†ต ์†”๋ฃจ์…˜, ์„œ๋ฒ„๋ณด์•ˆ ๋“ฑ์˜ ์ „๋ฌธ ์†”๋ฃจ์…˜ ๋ฐ ๊ธฐ์ˆ  ์—ญ๋Ÿ‰์„ ๋ณด์œ ํ•œ

๊ธฐ์—…์œผ๋กœ ์ตœ๊ทผ ์‚ฌ๋ฌผ์ธํ„ฐ๋„ท ๋ณด์•ˆ์†”๋ฃจ์…˜ ๊ฐœ๋ฐœ์— ๋ฐ•์ฐจ๋ฅผ ๊ฐ€ํ•˜๊ณ  ์žˆ๋‹ค.

ํฌ์Šค์ฝ” ๋ฒค์ฒ˜ํŒŒํŠธ๋„ˆ์Šค์—์„œ๋„ ๊ธˆ์œต ์„œ๋น„์Šค์˜ Paperless ๋ณด์•ˆ์†”๋ฃจ์…˜์„ ์Œ์„ฑ์ธ์‹

๊ธฐ์ˆ ๋กœ ๊ตฌํ˜„ํ•œ ์Šคํƒ€ํŠธ์—… (์ฃผ)์— ํ‹ฐ์ฝค์„ ๋ฉ˜ํ† ๋ง ์ค‘์— ์žˆ๋‹ค. ์ตœ๊ทผ ๊ตญ๋‚ด ๋ชจ

๋ณดํ—˜ํšŒ์‚ฌ์™€ ๊ณต๊ธ‰๊ณ„์•ฝ์„ ์ฒด๊ฒฐํ•˜์—ฌ ๊ฐœ๋ฐœ ์ง„ํ–‰ ์ค‘์— ์žˆ์œผ๋ฉฐ, B2B ์‹œ์žฅ์„ ์ค‘์‹ฌ์œผ๋กœ

๋ ˆํผ๋Ÿฐ์Šค๋ฅผ ์Œ“์•„ B2C๋กœ ์‚ฌ์—…์˜์—ญ์„ ๋„“ํ˜€๊ฐ€๊ณ  ์žˆ๋‹ค.

ํ–ฅํ›„ ์ „๋ง

B2C ์‹œ์žฅ์— ์ฃผ๋ชฉํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. B2C ๋ฐ์ดํ„ฐ ์–‘์ด ํญ์ฆํ•˜๊ณ  ์žˆ์œผ๋ฉฐ ์ง„์ž… ์žฅ๋ฒฝ์ด

B2B ์‹œ์žฅ์— ๋น„ํ•ด ๋‹ค์†Œ ๋‚ฎ๋‹ค. ์Šคํƒ€ํŠธ์—…๋“ค์ด ์ฃผ๋ชฉํ•ด์•ผ ํ•  ๋ถ€๋ถ„์ด๋‹ค. ๋ชจ๋ฐ”์ผ ๋ณด์•ˆ

์‹œ์žฅ์€ ์ด๋™ํ†ต์‹ ์‚ฌ๋‚˜ ์ œ์กฐ์‚ฌ์™€ ๊ฐ™์€ ํ”Œ๋žซํผ ์‚ฌ์—…์ž๊ฐ€ ์ฃผ๋„ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋˜๋‚˜,

์Šคํƒ€ํŠธ์—…๋“ค์˜ ๋ณด์™„ ๊ฐ€๋Šฅํ•œ ์š”์†Œ๊ธฐ์ˆ ์€ ์‹œ์žฅ ๋‚ด์—์„œ ์ถฉ๋ถ„ํ•œ ํฌ์ง€์…˜ ํ™•๋ณด๊ฐ€ ๊ฐ€๋Šฅํ• 

๊ฒƒ์ด๊ณ  ์ด๋Ÿฌํ•œ ๊ธฐ์ˆ ํ˜์‹ ์ด ์‹œ์žฅ์˜ ์„ฑ์žฅ์„ ๊ฐ€์†ํ™” ์‹œํ‚ฌ ๊ฒƒ์ด๋‹ค.